B&TB&TB&T
  • Advertising
  • Campaigns
  • Marketing
  • Media
  • Technology
  • Regulars
    • Agency Scorecards
    • Best of the Best
    • Campaigns of the Month
    • CMO Power List
    • CMOs to Watch
    • Culture Bites
    • Fast 10
    • New Business Winners
    • Spotlight on Sponsors
  • Jobs
  • Awards
    • 30 Under 30
    • B&T Awards
    • Cairns Crocodiles
    • Women In Media
    • Women Leading Tech
Search
Trending topics:
  • Nine
  • Cairns Crocodiles
  • Seven
  • Federal Election
  • AI
  • AFL
  • Pinterest
  • Married At First Sight
  • News Corp
  • NRL
  • Channel 10
  • Cairns Hatchlings
  • oOh!Media
  • Anthony Albanese
  • WPP
  • Ten
  • Special
  • TV Ratings
  • Radio Ratings
  • Sports Marketing

  • About
  • Contact
  • Editorial Guidelines
  • Privacy
  • Terms
  • Advertise
© 2025 B&T. The Misfits Media Company Pty Ltd.
Reading: Fastly Study Shows Large Amount Of Aussie IT Companies Are Operating Under Threat Of Cyber Attack
Share
B&TB&T
Subscribe
Search
  • Advertising
  • Campaigns
  • Marketing
  • Media
  • Technology
  • Regulars
    • Agency Scorecards
    • Best of the Best
    • Campaigns of the Month
    • CMO Power List
    • CMOs to Watch
    • Culture Bites
    • Fast 10
    • New Business Winners
    • Spotlight on Sponsors
  • Jobs
  • Awards
    • 30 Under 30
    • B&T Awards
    • Cairns Crocodiles
    • Women In Media
    • Women Leading Tech
Follow US
  • About
  • Contact
  • Editorial Guidelines
  • Privacy
  • Terms
  • Advertise
© 2025 B&T. The Misfits Media Company Pty Ltd.
B&T > Technology > Fastly Study Shows Large Amount Of Aussie IT Companies Are Operating Under Threat Of Cyber Attack
Technology

Fastly Study Shows Large Amount Of Aussie IT Companies Are Operating Under Threat Of Cyber Attack

Staff Writers
Published on: 30th May 2022 at 5:03 PM
Edited by Staff Writers
Share
8 Min Read
SHARE

Fastly, Inc., a global edge cloud platform provider, today released new research in partnership with Ecosystm that shows 75 percent of Australian businesses are now living with a vastly increased attack surface caused by their reliance on web-based applications.

Large attack surfaces are routinely sought out and tested by attackers looking for less-protected entry points into corporate IT environments.

According to the survey, organisations in Australia moved en masse to more decentralised IT architectures over the past two years, but still struggle with some of the cybersecurity implications of these kinds of digital- and cloud-first operating models. Cloud, web applications and the APIs that enable these apps to integrate and exchange data rate highly in the risk and challenge assessments by CIOs, IT directors and technology leaders of Australian organisations. API endpoints, cloud service provider authentication, and enterprise open source software are all seen to pose considerable risks as potential entry points for attackers.

Inadequate controls around these architectural elements, coupled with a lack of operational maturity and reliance on traditional defensive postures, has Australian business leaders on edge and fearful of attacks. The survey shows that 65 percent of large enterprises in Australia rate nation state attacks as a very high or high risk to their organisations. There is also concern among leaders of all business sizes over credential stuffing, which attackers may use to try to compromise cloud accounts and individual as-a-service logins.

The research also shows that:

  • IT leaders expect to increase focus on the security of web applications in the next two years, but more likely in 2023. Digital has dominated IT strategies over the past two years, but operating securely in a majority or fully web- or cloud-based environment means living with elevated risk tolerances and discomfort for security teams.
  • Application security often comes off second in the competition for attention and funding. Over half (53 percent) of IT leaders say they’re prioritising “other digital transformation projects” above application security in 2022, while 39 percent say “other business initiatives” – outside of IT – are taking priority, to the detriment of cybersecurity.
  • More than 40 percent of leaders identify cloud misconfiguration as being still among their top five cybersecurity challenges. Despite the attention and focus this issue has received in the past couple of years, and the rise of low-code/no-code platforms and configurations, cloud environments remain complex, and errors or misunderstandings mean even experienced engineers can encounter cost overruns and/or unintended data exposure risks. This is higher for enterprises (41 percent) than for large (22 percent) and medium-sized (26 percent) organisations.
  • The key challenge for managing application security initiatives is complexity. 55 percent of leaders say too many third parties are involved in end-to-end security of their applications, pointing to the new reality of operating in a cloud-, web- and API-driven world.

That is because a typical response by decision-makers to the increasing complexity of their technology environments is to deploy additional new security solutions. But that approach means nearly half of Australian companies have more than 50 cybersecurity tools, and are battling alert fatigue and high false positive rates as a result.

Organisations need a modern cybersecurity posture that enables them to anticipate threats before they happen, and respond instantly when attacks occur. They need security controls that are capable of automatically sensing, detecting, reacting, and responding to access requests, authentication needs, and outside and inside threats. Administration and application of these controls should also be automated to a high degree to improve coverage and consistency, and reduce the burden on Security Operations Centres (SOCs) and cybersecurity practitioners.

“As Australian companies move deeper into digital transformations, they come up against a known problem: the challenges of securing a rapidly rising number of mission-critical cloud services and API-centric applications,” said Derek Rast, area vice president Australia and New Zealand at Fastly. “The tools these companies use to secure their digital-first, cloud-first and microservices-based architectures need to evolve. Traditional web application and API security tools fall short in this regard. Leveraging Web Application Firewalls (WAFs) and Content Delivery Networks (CDNs) should be part of a holistic defense-in-depth security strategy.”

Illustrating perfectly the cyber maturity challenges faced by Australian companies is the lack of consistency in the operating parameters, powers and preparedness of cyber threat and incident response teams.

The research finds one in three cyber threat response teams lacks the support of key internal stakeholders, is unclear about escalation points for incident management, and doesn’t have the authority to confiscate or disconnect equipment and monitor suspicious activity, including from senior management.

In addition, when it comes to cyber threat response planning:

  • Only 54 percent have a full plan that includes legal and corporate communications teams
  • 50 percent rehearse the plan at least once a year, the other half practice less frequently or don’t practice at all
  • 48 percent have a timeframe for additions and improvements for the plan, and hold senior leaders responsible for making the improvements

Enterprises are more likely than large or medium-sized organisations to have a multi-stakeholder plan that is well-rehearsed. However, they’re also more likely to be subjected to regulated requirements for incident planning and response. This is supported in the study by compliance being identified as a major cybersecurity challenge facing organisations.

Medium and large organisations are more likely than enterprises to be rethinking the way they deploy applications and business logic to end users and to be in active pursuit of that target state. The research shows 64 percent of medium-sized organisations and 56 percent of large organisations are embracing edge computing, moving business logic from application servers to an edge cache. By contrast, just 43 percent of enterprises are doing the same – 10 percent below the overall average.

Moving business logic from the backend to the edge not only increases application performance but can also substantially reduce an organisation’s risk, since user requests are funnelled through a single ‘front door’, instead of to any number of servers that host the application.

Join more than 30,000 advertising industry experts
Get all the latest advertising and media news direct to your inbox from B&T.

No related posts.

Share
Staff Writers
By Staff Writers
Follow:
Staff Writers represent B&T's team of award-winning reporters. Here, you'll find articles crafted with industry experience spanning over 50 years. Our team of specialists brings together a wealth of knowledge and a commitment to delivering insightful, topical, and breaking news. With a deep understanding of advertising and media, our Staff Writers are dedicated to providing industry-leading analysis and reporting, both shaping the conversation and setting the benchmark for excellence.

Latest News

Antoinette Lattouf: “Why Would You Compromise Your Ethics & Your Integrity For A Slow-sinking Ship?”
13/05/2025
Hunt and Brew campaign
Aussie Coffee Connoisseurs Hunt & Brew Unveils Global ‘Infinite Hunting’ Campaign Via MITP Agency
13/05/2025
New Research Finds 90% Increase In Advertising Fatigue When Ad Campaigns Are Disconnected
13/05/2025
Skincare Brand QV Launches ‘Care Behind Every Bathroom Door’ Campaign Via Sunday Gravy & Half Dome
13/05/2025
//

B&T is Australia’s leading news publication magazine for the advertising, marketing, media and PR industries.

 

B&T is owned by parent company The Misfits Media Company Pty Ltd.

About B&T

  • About
  • Contact
  • Editorial Guidelines
  • Privacy
  • Terms
  • Advertise

Top Categories

  • Advertising
  • Campaigns
  • Marketing
  • Media
  • Opinion
  • Technology
  • TV Ratings

Sign Up for Our Newsletter



B&TB&T
Follow US
© 2025 B&T. The Misfits Media Company Pty Ltd. All Rights Reserved.
Welcome Back!

Sign in to your account

Register Lost your password?